2011
DOI: 10.1017/s0960129511000193
|View full text |Cite
|
Sign up to set email alerts
|

Secure information flow by self-composition

Abstract: Information flow policies are confidentiality policies that control information leakage through program execution. A common means to enforce secure information flow is through information flow type systems. Although type systems are compositional and usually enjoy decidable type checking or inference, their extensibility is very poor: type systems need to be redefined and proven sound for each new single variation of security policy and programming language for which secure information flow verification is des… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
217
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
7
1

Relationship

2
6

Authors

Journals

citations
Cited by 176 publications
(217 citation statements)
references
References 46 publications
0
217
0
Order By: Relevance
“…There are at least two natural strategies for defining a wp calculus in a relational setting. The calculus can either operate on both games in lockstep, or else it can operate on each game separately, in the style of self-composition [2]. Both strategies are incomplete: the lockstep wp calculus fails on programs that are not structurally equivalent, whereas self-composition fails to handle random assignments and adversary calls.…”
Section: An Overview Of Easycryptmentioning
confidence: 99%
“…There are at least two natural strategies for defining a wp calculus in a relational setting. The calculus can either operate on both games in lockstep, or else it can operate on each game separately, in the style of self-composition [2]. Both strategies are incomplete: the lockstep wp calculus fails on programs that are not structurally equivalent, whereas self-composition fails to handle random assignments and adversary calls.…”
Section: An Overview Of Easycryptmentioning
confidence: 99%
“…The embedding relies on separability; our conditions are inspired from self-composition [5], and are reminiscent of the monotonicity and frame properties of separation logic [19].…”
Section: Synchronized Productsmentioning
confidence: 99%
“…This restrictiveness makes practical programming impossible. Finally, the extensibility of type systems is very poor: each variant of the information flow policy or each new feature added to the programming language requires a modification of the type system and its soundness proof [15].…”
Section: Property Verification and Attack Synthesismentioning
confidence: 99%
“…This thesis discusses a method to encode the information flow property as a temporal logic property. To do this, we implement the idea of self-composition -a construction where a program is composed with its copy and each program copy keeps an independent memory [34,15]. Basically, we construct a program model that executes the program to be verified twice, in parallel with itself.…”
Section: Logic-based Verificationmentioning
confidence: 99%
See 1 more Smart Citation